Re: Speed and security of /dev/urandom

看板FB_security作者時間11年前 (2014/07/19 05:01), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串9/24 (看更多)
On 18.07.2014 3:41, Steven Chamberlain wrote: > Is there a good reason arc4random_buf() can't take bytes directly from > /dev/urandom or sysctl KERN_ARND? Therefore no longer needing to seed > first, periodically reseed, or use any stream cipher? One of the reason I hear is that true random entropy bits can be quickly exhausted if every userland program will drain them so much. -- http://ache.vniz.net/ _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #1JoOiEIU (FB_security)
討論串 (同標題文章)
文章代碼(AID): #1JoOiEIU (FB_security)